|
|
|
Lilu Zhu, Yang Wang, Yunbo Kong, Yanfeng Hu and Kai Huang
The integration of geospatial-analysis models is crucial for simulating complex geographic processes and phenomena. However, compared to non-geospatial models and traditional geospatial models, geospatial-analysis models face more challenges owing to ext...
ver más
|
|
|
|
|
|
|
Jingyun Zhang, Xiaohui Liu, Haijiang Wei, Mengnan Liu, Wenlong Huang and Xianghai Yan
When shifting gears around a tractor?s power shift transmission, it is necessary to coordinate the control of multiple clutches and formulate a reasonable clutch engagement law to ensure the reliability and power of the power system. This paper explores ...
ver más
|
|
|
|
|
|
|
Zhe Yang, Yi Huang, Yaqin Chen, Xiaoting Wu, Junlan Feng and Chao Deng
Controllable Text Generation (CTG) aims to modify the output of a Language Model (LM) to meet specific constraints. For example, in a customer service conversation, responses from the agent should ideally be soothing and address the user?s dissatisfactio...
ver más
|
|
|
|
|
|
|
Tuan Phong Tran, Anh Hung Ngoc Tran, Thuan Minh Nguyen and Myungsik Yoo
Multi-access edge computing (MEC) brings computations closer to mobile users, thereby decreasing service latency and providing location-aware services. Nevertheless, given the constrained resources of the MEC server, it is crucial to provide a limited nu...
ver más
|
|
|
|
|
|
|
Yang Bai, Xiaocui Li, Xinfan Wu and Zhangbing Zhou
With the booming proliferation of user requests in the Internet of Things (IoT) network, Edge Computing (EC) is emerging as a promising paradigm for the provision of flexible and reliable services. Considering the resource constraints of IoT devices, for...
ver más
|
|
|
|
|
|
|
Shuang Guo, Yarong Du and Liang Liu
In order to achieve reliability, security, and scalability, the request flow in the Internet of Things (IoT) needs to pass through the service function chain (SFC), which is composed of series-ordered virtual network functions (VNFs), then reach the dest...
ver más
|
|
|
|
|
|
|
Furkat Safarov, Mainak Basak, Rashid Nasimov, Akmalbek Abdusalomov and Young Im Cho
In the rapidly evolving landscape of internet usage, ensuring robust cybersecurity measures has become a paramount concern across diverse fields. Among the numerous cyber threats, denial of service (DoS) and distributed denial of service (DDoS) attacks p...
ver más
|
|
|
|
|
|
|
Ikram Karabila, Nossayba Darraz, Anas El-Ansari, Nabil Alami and Mostafa El Mallahi
Recommendation systems (RSs) are widely used in e-commerce to improve conversion rates by aligning product offerings with customer preferences and interests. While traditional RSs rely solely on numerical ratings to generate recommendations, these rating...
ver más
|
|
|
|
|
|
|
Abdullah Ali Jawad Al-Abadi, Mbarka Belhaj Mohamed and Ahmed Fakhfakh
In recent years, the combination of wireless body sensor networks (WBSNs) and the Internet ofc Medical Things (IoMT) marked a transformative era in healthcare technology. This combination allowed for the smooth communication between medical devices that ...
ver más
|
|
|
|
|
|
|
Quan Sun, Xuhui Pan, Xiao Ling, Bo Wang, Qinghong Sheng, Jun Li, Zhijun Yan, Ke Yu and Jiasong Wang
In the realm of non-cooperative space security and on-orbit service, a significant challenge is accurately determining the pose of abandoned satellites using imaging sensors. Traditional methods for estimating the position of the target encounter problem...
ver más
|
|
|
|